User Tools

Site Tools


documentation:client

This is an old revision of the document!


PEIG - ADUCID Client software

PEIG® is the fundamental client element of ADUCID® that fully manages electronic identities of its user.

PEIG documentation is located at http://www.aducid.com/support

Currently PEIG is supported on Windows 7, Windows 8, Windows 10, Mac OS X, Android (4.0.4+) and iOS 8 devices

Windows also supports PEIG located on a USB token

Windows PEIG PC, OS X PEIG

Windows/ OSX PEIG runs on the same computer as user’s browser. User clicks “Authentication” button

PEIG USB

Windows has option to store identity files on a USB. This feature is accessible for every PEIG PC installation inserting USB disk and preparing it for ADUCID. USB on OS X not supported due to Apple store restrictions

iOS PEIG and Android PEIG

PEIG can run on mobile phones or tablets with Android 4.0 or iOS 8. PEIG can be called in used in two ways:

  • QR code scanning using phone / tablet camera
  • calling aducid: URI schema (on Android Intent is preferred)

Users can authenticate into desktop application scanning a QR code using mobile PEIG (or QR code displayed by another PEIG).

Native applications are also supported. They can call PEIG directly using schema / intent or use PEIG API (Papi) – See Integration with mobile applications

Personal factor (PF)

To proof his/ her identity ADUCID provides a feature called personal factor

  • PF something only user know
  • ADUCID uses a picture sequence or number sequence
  • User has only one PF for all his services and devices

Comfort factor (CF)

As soon as PF is created user can add a comfort factor. When service provider allows, CF can be used instead of PF. PF can be always use instead CF.

NFC

On Android phone a user can use a NFC tag.

Apple Touch ID

On iOS devices with fingerprint sensor (iPhone 5S or better) user can activate fingerprint factor as addition to his / her secret.

Fingerprint

For phones with native Android fingerprint support (not for proprietary implementations).

Bluetooth

User can user some BT device like sport tester - something she/he has. When BT device is visible, CF authentication is automatically resolved.

Replicas

With ADUCID user is not limited to just one device. On the contrary he / she can have “unlimited” number of devices called replicas. Replicas are PEIG with different cyber id referring to the same person. Replicas are manged from PEIG on mypeig.aducid.com server (PEIGs have this link embedded).

documentation/client.1528976325.txt.gz · Last modified: 2018/06/14 11:38 by tjotov